Have You Heard of the Near-Ultrasound Inaudible Trojan?

Introduction

Do you use Siri? What about Google Home or the Amazon Alexa? Some other, similar smart device hooked up to your home or office? Then you’ll want to read on about this latest vulnerability in your network.

Researchers at the University of Texas San Antonio and University of Colorado Colorado Springs have discovered a potential malware technique capable of sneaking onto voice-controlled devices to take control of the system or network.

5 BYOD security tips every business should know

With the rise of remote work, bring your own device (BYOD) has become more prevalent, allowing employees to use their personal devices for work. But this flexibility introduces new security challenges for companies. The use of personal devices to access work-related data may expose sensitive information to potential threats.

Spam? Don’t Just Click “Delete”

No matter what email platform you use, who you connect with, and where you choose to give out your email address, we all deal with it: Spam messages.

Sometimes, spam is clearly recognizable as fake. Others look like viable sales pitches…and sometimes they’re disguised as phishing messages to make you think that you’re interacting with something or someone that you’re not.

What is PKI and Why Does it Matter?

Do you know what a network security key is? Simply put, it’s the password that you need to input before your local network will allow you to connect. Think about your home network: Is there a special WiFi for everyone to use on the premises, and it’s locked so that the network isn’t flooded with passersby?

What You Need to Know About Physically Securing Your Devices

A lot of cybersecurity awareness revolves around the digital security of all your devices…but how well do you take care of their physical security?

Data breaches don’t just happen when your computer gets infected with malware or you fall for a phishing scam. How often have you done the “phone, keys, wallet” check before you leave a venue? Thieves can steal your laptop out of your bag or your phone from your pocket, too. Then, they can crack your password and steal all your data directly!

How Encryption Really Works: A Beginner’s Guide

Encryption is one of the most commonly misunderstood subjects when it comes to protecting sensitive data. Even those with a basic understanding of encryption often misidentify certain components, use the wrong algorithm and fail to understand how they are used in practice. These myths and misunderstandings are not only frustrating—they can also put your personal security at risk.

How to Manage Third-Party Risks

Third-party risk management is a very serious and ever-more pressing need than ever before. Our monumental reliance on software as a service (SaaS) tools only grows with each new technology that we integrate into our lives, homes and workspaces.